(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Publishing Venue

Related People

Abstract

This paper introduces a congestion management protocol for connectionless packet networks. Congestion in connectionless packet network environment is often related to the shared band- width within a cell boundary where bandwidth is shared between multiple users. By effectively capitalizing this information, the network can achieve throughput and higher level of user data security. Our proposal is based on the supposition that the protocols at the network (IP) layer and above will not be modified.

Copyright

Motorola Inc. September 1997

Country

United States

Language

English (United States)

This text was extracted from a PDF file.

At least one non-text object (such as an image or picture) has been suppressed.

This is the abbreviated version, containing approximately
40% of the total text.

Page 1 of 3

0 M

MOTOROLA Technical Developments

CONGESTION MANAGEMENT PROTOCOL FOR CONNECTIONLESS PACKET NETWORKS

by Paula Tjandra and Tomas Capurka

ABSTRACT

This paper introduces a congestion management protocol for connectionless packet networks. Congestion in connectionless packet network environment is often related to the shared band- width within a cell boundary where bandwidth is shared between multiple users. By effectively capitalizing this information, the network can achieve throughput and higher level of user data security. Our proposal is based on the supposition that the protocols at the network (IP) layer and above will not be modified.

INTRODUCTION

Network security and bandwidth limitations have created a demand for user data encryption and compression functionality in data communication services. Data compression and stream type encryption functions require an underlying data link service which provides a reliable connection. In case of data loss the release of data layer connection is used as an indication to resynchronize the encryption key and the compression dictionaries at both end points.

Frequent datagram loss results in frequent initialization of the encryption key and the compression dictionaries. Unfortunately the security level of encryption for, a stream type encryption algorithm decreases with the increase in the number of resynchronizations of the encryption algorithm. Also, the performance of a compression algorithm is greatly reduced as the number of resynchroniza- tions of the compression dictionary increases. Moreover, resynchronization requires reestablish- ment of data link layer which causes overhead in bandwidth usage for establishment messages between the two end points.

In current packet data systems the compression, encryption and link layers do not take into consider- ation that congestion is often related to the shared bandwidth within a cell boundary. When the packet data network protocol is IP, congestion problems are handled by dropping of packets. When transport layer protocol TCP is used in conjunction with IP, packet losses are interpreted as an indication of congestion. However, when the congestion occurs at the cell level, the packets must be dropped at the link layer, resetting encryption and compression causing the negative impacts mentioned above.

In CDPD', a packet data system which is already available in market, cell level congestion results in data link layer transmission error. This also forces the encryption key and compression dictionary to be initialized. Multiple users at a con- gested cell will experience the impact of frequent resynchronization.

This paper proposes adding a congestion management protocol (CMP) below the IP layer and above the encryption/compression layer. The purpose of CMP is to decrease the number resynchronization caused by data loss.

DESCRIPTION

CONNECTIONLESS PACKET NETWORK MODEL

A logical view of the underlying connectionless packet network and the manner...